General

  • Target

    ae1da806b8f305301ca8269b48e871b0_NeikiAnalytics

  • Size

    226KB

  • Sample

    240516-tarzwabh9w

  • MD5

    ae1da806b8f305301ca8269b48e871b0

  • SHA1

    18a7a11e3f5d27467c8d72cbc6f32702dcfedbd9

  • SHA256

    6fd840bb332e17bd0495ebb58ffe85af5399464dde2707cc1e72c1315addb85b

  • SHA512

    10d7d13da509335fe1e7a651ddc17ed659b592477dd25a9c277efb7b5ff3d3d3a7407d5e154ff1e4cbb4b338a584bdbab38ab690dfea5d1aa2cc883ec10b95a0

  • SSDEEP

    3072:ymb3NkkiQ3mdBjFo73PYP1lri3KoSV31x47WBQ:n3C9BRo7MlrWKo+lxQ

Malware Config

Targets

    • Target

      ae1da806b8f305301ca8269b48e871b0_NeikiAnalytics

    • Size

      226KB

    • MD5

      ae1da806b8f305301ca8269b48e871b0

    • SHA1

      18a7a11e3f5d27467c8d72cbc6f32702dcfedbd9

    • SHA256

      6fd840bb332e17bd0495ebb58ffe85af5399464dde2707cc1e72c1315addb85b

    • SHA512

      10d7d13da509335fe1e7a651ddc17ed659b592477dd25a9c277efb7b5ff3d3d3a7407d5e154ff1e4cbb4b338a584bdbab38ab690dfea5d1aa2cc883ec10b95a0

    • SSDEEP

      3072:ymb3NkkiQ3mdBjFo73PYP1lri3KoSV31x47WBQ:n3C9BRo7MlrWKo+lxQ

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Matrix

Tasks